ST_TUES_AM_0835_Dickson - NC AWWA-WEA

advertisement
map.norsecorp.com
If possible I like starting off with a view of a live attack
screen. Very effective means of conveying the
compelling need for cybersecurity. If I’m using my PC I
can set this up easily.
Don Dickinson
Phoenix Contact USA
NC AWWA-WEA Automation Committee
Agenda
 Growing need for cybersecurity
 Protecting critical infrastructure
 Key Standards & Guidance for Cybersecurity
 AWWA G430-14 Security Practices for Operation & Management
 NIST SP 800-82 Guide to Industrial Control System (ICS)
Security
 ISA 62443-2-1 Security for Industrial Automation & Control
Systems (IACS)
 Why a business case is needed
 How to develop a business case
NC AWWA-WEA Automation Committee
Security breaches are inevitable…
Being a headline is not ®
Mandiant – A FireEye™ Company
Tough questions after attack…
Could you have done
more to prevent this
attack?
What is the impact on
public safety?
Will I lose my
job?
How will this impact the
public’s confidence in
your utility?
What is the
environmental impact?
How will this impact your
requests for funding?
What are the expected
costs of fines and
litigation?
Easy to sound like an alarmist…
the Cyber
end is
near
NC AWWA-WEA Automation Committee
JPMorgan Chase
Security Threats
 Nation-State Attacks (by Russia, China, N Korea, many





others including US)
Extortion (Sony)
Data Destruction (Sony, Saudi Aramco)
Bank Card & Personal Data Breaches (US Office of
Personnel Mgmt (22M affected), Anthem Health (80M),
Premera Blue Cross (11M), JP Morgan Chase (76M), Home
Depot (56M), Target (40M), many others)
Third-Party Breaches (Target - HVAC connection, Home
Depot – stolen vendor credentials)
Critical Infrastructure (Telvent, Saudi Aramco, Iranian
Nuclear Facilities, others)
NC AWWA-WEA Automation Committee
Attacks double on SCADA in 2014
source: 2015 Dell Security Annual Threat Report
“Everyone knows the threats are real
and the consequences dire, so we can
no longer blame lack of awareness for
the attacks that succeed.”
Patrick Sweeney, Executive Director Dell Security
NC AWWA-WEA Automation Committee
Why isn’t security a bigger focus?
NBC Los Angeles: NewsChopper4
captures geyser blowing through Sunset
Boulevard, flooding UCLA campus
July 29, 2014
More pressing concerns…
Protecting Critical Infrastructure
Presidential Policy Directive – Critical
Infrastructure Security and Resilience
(PPD-21, February 12, 2013)
• Cyber threat to critical infrastructure continues to grow
• One of the most serious national security challenges for
the US
• Critical infrastructure must be secure and able to
withstand and rapidly recover from all hazards
NC AWWA-WEA Automation Committee
Key Security Standards & Guidance
 ANSI / AWWA G430-14 Security Practices for
Operation and Management
 NIST Special Publication 800-82 rev 2: Guide to
Industrial Control Systems (ICS) Security
 ANSI / ISA-62443-2-1 Security for Industrial
Automation and Control Systems: Establishing an
IACS Security Program
NC AWWA-WEA Automation Committee
ANSI / AWWA G430-14
Security Practices for Operation and Management
Purpose is to define the minimum requirements for
protective security program for a water or wastewater
utility that will promote the protection of employee
safety, public health, public safety, and public
confidence.
NC AWWA-WEA Automation Committee
ANSI / AWWA G430-14
Security Practices for Operation and Management
Requirements: Section 4.0
4.1 Explicit commitment to security
4.1.1 Explicit and visible commitment of senior leadership to
security. The utility shall establish an explicit, visible, easily
communicated, enterprise-wide commitment to security. This
shall be represented by the development of a security plan, by
policies, and by other documents that make security a part of
daily operations visible to employees and customers.
NC AWWA-WEA Automation Committee
NIST SP 800-82 Rev 2
Guide to Industrial Control Systems (ICS) Security
 Purpose is to provide guidance for securing
industrial control systems (ICS), including
supervisory control and data acquisition (SCADA)
systems, distributed control systems (DCS), and
other systems performing control functions.
NC AWWA-WEA Automation Committee
NIST SP 800-82 Rev 2
Guide to Industrial Control Systems (ICS) Security
4.1 Business Case for Security
The first step in implementing an information security
program for ICS is to develop a compelling business
case for the unique needs of the organization. The
business case provides the business impact and
financial justification for creating an integrated
information security program.
NC AWWA-WEA Automation Committee
ISA-62443 Security for Industrial
Automation and Control Systems (IACS)
ANSI/ISA–62443-2-1 (99.02.01) – 2009
Establishing an Industrial Automation and Control
Systems Security Program
 Describes the elements of a Cyber Security
Management System (CSMS)
 Elements relate to policy, procedures, practices and
personnel
NC AWWA-WEA Automation Committee
ISA 62443-2-1
Develop a business rationale
4.2.2
 DESCRIPTION: A business rationale is based on the
nature and magnitude of financial, health, safety,
environmental, and other potential consequences
should IACS cyber events occur.
 RATIONALE: Establishing a business rationale is
essential for an organization to maintain
management buy-in to an appropriate level of
investment for the IACS cybersecurity program.
NC AWWA-WEA Automation Committee
ISA 62443-2-1
Develop a business rationale
4.2.2.1
REQUIREMENTS: Develop a business rationale
 The organization should develop a high-level
business rationale as a basis for its effort to manage
IACS cyber security, which addresses the unique
dependence of the organization on IACS.
NC AWWA-WEA Automation Committee
ISA 62443-2-1
Develop a business rationale
Annex A (informative)
Guidance for developing the elements of a CSMS
 Description of element
 Element-specific information
 Supporting practices
 Baseline practices
 Additional practices
 Resources used
NC AWWA-WEA Automation Committee
ISA 62443-2-1
Develop a business rationale
A.2.2.3
Key components of business rationale
 Prioritize business consequences – What events
would have the greatest impact on the organization?
 Prioritize threats – Which are the most credible?
 Estimated annual business impact – What is the
business impact, if possible, in financial terms?
 Cost – What is the estimated cost of the human
effort and technical countermeasures that the
business rationale intends to justify?
NC AWWA-WEA Automation Committee
Answers for tough questions…
Could you have done
more to prevent this
attack?
Just 2 years till
retirement!
Because we have a comprehensive
security plan we were able to detect the
cyber activity early and implement
countermeasures quickly to mitigate it.
As a result the impact on public safety,
the environment and our operations
were minimized.
Key points on cybersecurity
 Security is a process not a task! Journey not a




destination!
Security is not an absolute! It’s a matter of degree.
Neither practical nor feasible to fully mitigate all risks.
Must allocate available resources as efficiently as
possible.
The responsibility of protecting IACS from cyber events
belongs to the people who operate and maintain these
systems.
Goal: Risk management for critical infrastructure.
NC AWWA-WEA Automation Committee
Easy questions for me?
NC AWWA-WEA Automation Committee
Presenter
Don Dickinson
Senior Business Development Manager – Water Sector
Phoenix Contact USA
Contact information:
e-mail: ddickinson@phoenixcon.com
Phone: 800-888-7388, ext 3868
White Paper:
 Making a Business Case for Cybersecurity
NC AWWA-WEA Automation Committee
Download